EMS Everywhere Agenda Session Audience Goal Time Introduction

Slides:



Advertisements
Similar presentations
CTS Strategic Roadmap Walkthrough, v1.2 Dan Mercer.
Advertisements

<<Date>><<SDLC Phase>>
Turning Policy Into Reality Tony S Krzyżewski Director, Chief Technical Officer Protocol Policy Systems.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Customer Overview Aligning Technology evolution to Strategic Business Imperatives.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Overview and Introduction
Services Flexible Workstyle and People-Centric IT Windows Accelerate: Deployment Windows 8.1 Proof of Concept (Window 8.1 PoC) will demonstrate how the.
0 Copyright 2012 FUJITSU Service Consulting Program SCP for Sales A consultative approach to identify additional opportunities to increase the pipeline.
Enterprise Project Management (EPM)
Architecture in practice Module 1 Overview. What this course is not Does not provide an in-depth technical review of the Microsoft product stack What.
Marco Nasca Senior Director, Client Solutions TRANSFORMING DISCOVERY THROUGH DATA MANAGEMENT.
LT Leading Teams E.S. Tunis and Associates Inc. Welcome to ESTA’s learning design workshop. The ideas developed in this workshop will set the foundation.
Tom O’Reilly, CTO - TEEAM, VCE DIGITAL BANKING SUCCESS THROUGH THE EMC FEDERATION.
How to give a PowerPoint Presentation Staff Development Group and Central Computing Services.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
DOCUMENT #:GSC15-PLEN-09 FOR:Presentation SOURCE:ITU AGENDA ITEM:4.6 CONTACT(S):Malcolm Johnson ITU Update since GSC-14 Malcolm Johnson Director, Telecommunication.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
Shared Assessment Committees Update ©2012 The Shared Assessments Program. All Rights Reserved.
Enterprise Service Management (ESM) An Approach for Adopting and Adapting Best Practice Programs to Manage, Secure and Improve an Organizations Information.
“ ID Management, including routing and addressing in the Future Internet ” session Format 1,5 hours time slot: Nov. 23 rd, 11:00 – 12:30 facilitate multi-disciplinary.
Michael Saucier - OSIsoft Cliff Reeves - Microsoft Your Portal to Performance An Introduction to the RtPM Platform Copyright c 2004 OSIsoft Inc. All rights.
WELCOME 11 & 12 May Knowledge Management and Labour Market Intelligence Regional Awareness Workshop 2, Phase 2.
Articulate the major security risks and legal compliance issues for a Fire and Rescue Service. Identify and justify technical controls for securing remote.
Azure Stack Foundation
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Instructional slide to Partner: REMOVE BEFORE PRESENTING TO CUSTOMER
Power BI – What You Need to Know
Deck Customization Checklist
Internal primer Empower Your Employees
Azure Stack Foundation
Read the full story here
Enterprise Mobility & Security (EMS) Everywhere Assessment
Office 365 Security Assessment Workshop
Deployment Planning Services
EMS Everywhere Workshop Overview February 2017
Enterprise Mobility Suite Technical and Business Briefing
Transforming business
Office 365 Security Assessment Workshop
Deployment Planning Services
Introduction WFP Logistics, We Deliver.
Mass Casualty Incident Plan Training
SAM05 Unlocking the Value of SAM: How SAM Value Engagements impact profitability for partners Arnold Sharp CEO : First Technology South Africa Monique.
Azure Stack Foundation
Conference overview DAY 1
Avanade balances data security and employee privacy with Microsoft Intune Avanade is the leading provider of innovative digital and cloud services, business.
Sales Diagnostic Tool Kit
Enterprise Mobility Suite (EMS) Everywhere Assessment
Digital Disruption An ISP take on trends and possibilities
DO NOT PRINT IN WORKBOOK
Enterprise-grade solutions for a mobile-first, cloud-first world
SAM Cloud Productivity Engagement
Microsoft Services Cloud Productivity Solutions
Microsoft 365 – Make it real with GTM Accelerators
Business Transformation
Artificial Intelligence Changes the Security Landscape
Machine Learning Session
1/2/2019 4:34 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Awingu Boosts Profile via Social, Marketing Campaigns
Work. Reimagined. Value Discovery Workshop
The People Ready Vision for Business in the Enterprise
Conducting Needs Assessments for UF/IFAS Extension
FOR MICROSOFT PARTNER INTERNAL USE.
Employee engagement Delivery guide
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Work. Reimagined. Value Discovery Workshop
HPE-Microsoft Hybrid Cloud Roadshow Agenda
HEALTH WARNING! – Times are approximate only!
Cloud Management as a Service
Architecture in practice
Presentation transcript:

EMS Everywhere Agenda Session Audience Goal Time Introduction Overview of the session agenda and goals for the workshop. CISO CIO IT Directors and teams Outline the plan for the day 15 min. Security in a mobile and cloud first world How Microsoft security enables digital transformation through a comprehensive platform, unique intelligence, and broad partnerships ISO CIO IT Directors and teams Highlight role of security in digital transformation initiatives Better understanding of the impact that mobility and cloud have on the organization 30 min. Use case scenarios Discussion of security challenges facing businesses today through five representative use cases. CISO/CIO IT Directors and teams Understand how these scenarios are not addressed/solved by individual point solutions/approaches Identity management and security Focused discussion on corporate identities (Internal and cloud), the impact they have with security, and how to best secure and manage them in a mobile and cloud first world. IT Directors Identity Security Mobility Ascertain business and technical goals with Identity Identify security risk and gaps with current approach/solutions Alignment of Microsoft components to address risk and gaps Outline action items and next steps moving forward 3 hrs. LUNCH   Mobile device and application management Focused discussion on the impact mobility is having within organizations, the challenges it raises, and how to maximize the use of these devices. Ascertain business and technical goal with mobility 1 1 /2 hrs. BREAK Classification and protection of data Focused discussion on protection of corporate data, the impact of cloud and mobile technologies on data leakage. Ascertain business and technical goals with document security 1 hr. Recap and review Review of results in preparation for delivering follow-up document, which will provide blue print for EMS moving forward. CISO IT Directors Provide tangible action plan for next steps (Session write-up will follow with in 3-5 business days)